{"title":"Information technologies for decision-making in formation uniform database of analogue objects of the researched object","authors":"N. M. Yershova","doi":"10.15276/imms.v12.no3.182","DOIUrl":"https://doi.org/10.15276/imms.v12.no3.182","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129602073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improvement of the pseudorandom key sequences generation algorithm based on cellular automaton and many-valued logic bent-sequences","authors":"M.V. Khymenko, A. Sokolov","doi":"10.15276/imms.v12.no3.137","DOIUrl":"https://doi.org/10.15276/imms.v12.no3.137","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129449021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent system for assessing and forecasting the risk of failure of components of a complex technical system","authors":"A.V. Vychuzhanin","doi":"10.15276/imms.v12.no3.154","DOIUrl":"https://doi.org/10.15276/imms.v12.no3.154","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132798392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Steganoanalytical algorithm based on the study of the singular decomposition of digital image matrix blocks","authors":"K. Tryfonova, S. Sokalsky","doi":"10.15276/imms.v12.no1-2.104","DOIUrl":"https://doi.org/10.15276/imms.v12.no1-2.104","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129780553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of a minimal complexity suboptimal control system for the vacuum distillation column of an alcohol production plant","authors":"A. Stopakevych, O. Stopakevych","doi":"10.15276/imms.v12.no1-2.84","DOIUrl":"https://doi.org/10.15276/imms.v12.no1-2.84","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123222561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessment of the states of functioning of the state cybernetic protection system","authors":"V. Khoroshko, Yulia Khokhlachova","doi":"10.15276/imms.v12.no1-2.114","DOIUrl":"https://doi.org/10.15276/imms.v12.no1-2.114","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131217614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information system for enterprises cyber security normative support","authors":"V.P. Halytsky, O. Stopakevych","doi":"10.15276/imms.v12.no1-2.23","DOIUrl":"https://doi.org/10.15276/imms.v12.no1-2.23","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126154337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automation of configurating secure connection to corporate networks","authors":"P. Patalashko, N. Kushnirenko","doi":"10.15276/imms.v12.no1-2.73","DOIUrl":"https://doi.org/10.15276/imms.v12.no1-2.73","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134270864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital image falsification done by method of adobe photoshop patch","authors":"M.V. Gontar, V. Zorilo, O. Lebedeva","doi":"10.15276/imms.v12.no1-2.40","DOIUrl":"https://doi.org/10.15276/imms.v12.no1-2.40","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125828947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The steganographic method with multiple access based on frequency-spatial matrices","authors":"A. Sokolov","doi":"10.15276/imms.v12.no1-2.5","DOIUrl":"https://doi.org/10.15276/imms.v12.no1-2.5","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121816411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}